Intoto iGateway VPN and iGateway SSL-VPN allow context-dependent attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification, a related issue to CVE-2006-2940.
References
Link | Resource |
---|---|
http://secunia.com/advisories/22206 | Vendor Advisory |
http://www.uniras.gov.uk/niscc/docs/re-20060928-00661.pdf?lang=en | Vendor Advisory |
http://www.vupen.com/english/advisories/2006/3859 | |
http://secunia.com/advisories/22206 | Vendor Advisory |
http://www.uniras.gov.uk/niscc/docs/re-20060928-00661.pdf?lang=en | Vendor Advisory |
http://www.vupen.com/english/advisories/2006/3859 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/22206 - Vendor Advisory | |
References | () http://www.uniras.gov.uk/niscc/docs/re-20060928-00661.pdf?lang=en - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3859 - |
Information
Published : 2006-10-10 04:06
Updated : 2025-04-09 00:30
NVD link : CVE-2006-5179
Mitre link : CVE-2006-5179
CVE.ORG link : CVE-2006-5179
JSON object : View
Products Affected
intoto
- igateway_vpn
- igateway_ssl-vpn
CWE